共 21 条
[1]
Bertsekas D P., 1995, NONLINEAR PROGRAMMIN, P223
[2]
Boyd S., 2004, CONVEX OPTIMIZATION, P138
[4]
Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks
[J].
2009 IEEE 28TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCC 2009),
2009,
:208-215
[6]
HALLDORSSON MM, 2004, ACM S PRINC DISTR CO, P107
[8]
Jin Z., 2009, ACM SIGMOBILE Mob. Comput. Commun. Rev, V13, P74, DOI DOI 10.1145/1621076.1621084
[9]
Jin Z, 2009, 2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, P1
[10]
Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks
[J].
IEEE NETWORK,
2013, 27 (03)
:46-50